Electronics: Software-Defined Networking For Unmanned Aerial Vehicular Networking and Security: A Survey
Electronics: Software-Defined Networking For Unmanned Aerial Vehicular Networking and Security: A Survey
Electronics: Software-Defined Networking For Unmanned Aerial Vehicular Networking and Security: A Survey
Review
Software-Defined Networking for Unmanned Aerial
Vehicular Networking and Security: A Survey
James McCoy and Danda B. Rawat *
Data Science and Cybersecurity Center (DSCC), Department of Electrical Engineering and Computer Science,
Howard University, Washington, DC 20059, USA; [email protected]
* Correspondence: [email protected]; Tel.: +1-202-806-2209
Received: 20 September 2019; Accepted: 22 November 2019; Published: 3 December 2019
Abstract: Despite the immense benefits offered by the utilization of unmanned aerial vehicles (UAVs)
in civilian and military applications, significant work needs to be done to ensure that these systems
are able to securely communicate and resiliently operate to accomplish the mission. As the UAVs
grow with their popularity and usability for different applications, there is a dire need to ensure
that UAVs and their networks are capable of mitigating cyber-attacks on the fly. One approach that
has gained considerable popularity is Software-Defined Networking (SDN) based solutions. SDN is
a networking paradigm that has gained attention due to its dynamic flexibility to program networks
and increase network visibility, and its potential to assist in the mitigating security vulnerabilities
in the network including the network of UAVs. This article provides an overview of recent advances,
and current state of art related to security vulnerabilities and SDN enabled countermeasures. This
paper also presents a comparison of different approaches in a tabular form and a discussion of
challenges and future research directions with respect to UAV security.
1. Introduction
In recent years, Unmanned Aerial Vehicles (UAVs) have gained considerable popularity
with military, civilian, and public organizations for their diverse applications [1–4]. UAVs are currently
deployed for numerous mission types including investigations, border surveillance, delivery services,
traffic monitoring, and environmental monitoring. Most importantly, the military has used this
technology with the broad goal of leveraging its immense potential to improve national security for
sensitive combat missions. By 2035, the Department of Defense (DoD) expects that the percentage of
unmanned vehicles will to grow from 25% of their military fleet to approximately 70% [5]. The U.S.
military increased its investment in research and development of UAV technology from $2.3 billion
in 2008 to $4.2 billion in 2013 [6]. Moreover, Rani et al. [7] highlighted that the Federal Aviation
Administration estimated that by 2020, U.S. will have more than 30,000 drones actively operating in
the US airspace. The continued growth and innovation of UAV related technology has increased device
accessibility while concurrently making the device a more cost effective and powerful platform [7].
The continued growth and innovation of UAV related technology will allow for more accessible,
cheaper, and more effective unmanned systems [8]. Given the broad use of this technology one
emerging concern is security and reliability of the UAV communication networks. Many advancements
have been made in this technology but numerous challenges have to be addressed related to the ability
for the devices to communicate securely. Secure communication is increasingly becoming more
important because these devices are performing a central role in civilian and military operations.
Network vulnerabilities can result in unauthorized access to sensitive or critical mission information
ultimately posing a threat to National security. For example, in 2009, Iranian-backed Shiite militants
hacked the live feed of a Predator drone using an online software called SkuGrabber, which allowed
insurgents access to the drone’s encrypted data [9,10]. Software-Defined Networks (SDNs) are
increasingly being explored to mitigate many network vulnerabilities. SDN is a networking technology
that provides programmability and network visibility for management and security [11] by separating
hardware, control, and data planes of the networking infrastructure. The separation of a network’s
control structure and communication infrastructure is replaced by a programmable control layer.
This layer allows the configuration of the network’s essential functionality [11,12]. The implementation
of SDN into UAV networking differs greatly from rest of the networks because of the network vector
and attack surfaces which are being attacked.
The purpose of this study is to provide a comprehensive review of SDN based security solutions
that have been adopted to mitigate UAV network attacks. Specifically, this paper focuses on mitigation
techniques that are based on SDN system and its capability to combat cyber attacks on UAV systems.
Note that there are several solutions based on SDN for general networks which are not included if those
approaches are not relevant to UAV networks. Although there are some related papers on UAV security
(for further details, please refer to Section 4), we present peer-reviewed security solutions on the rapidly
advancing research field of SDN enabled UAV networks. Specifically, the main contributions of this
paper include:
The rest of the paper is organized as follows: Section 2 provides a brief historical overview
of notable advances inn UAV technology, Section 3 provides UAV network architecture and
communication. Section 4 discusses the SDN architecture and its security features. Section 5 presents
SDN implementation in UAV networks and followed by SDN enabled UAV network security in
Section 7. Section 8 discusses open research issues. Section 9 concludes the paper.
Figure 2. A typical UAV networks with communication links with ground control station, aka Ground
Data Acquisition Unit (GAU) and satellite.
Electronics 2019, 8, 1468 4 of 25
One necessary aspect of effective UAV communication is the ability of these devices to securely
communicate in an effective manner to meet the goal of the assigned mission. Collaborative
communication is regarded as an ability for UAVs to communicate with other UAV devices as
well as to the ground control stations, as shown in Figure 2. Moreover, effective UAVs should
be capable of acting as communication relay nodes which can connect flying ad hoc networks (FANET)
clusters. Within this network, the ability for UAV devices to serve as relay ensures communication
is always available using either single hop or multi-hop communications. UAVs acting as network
gateways provide connectivity to the infrastructure such as satellite or ground stations, or backbone
networks in the occurrence they are being used in distant geographic areas or areas distracted by
natural or man-made calamities. Other important requirements that facilitate seamless communication
in the UAV architecture are data processing, data storage, assisted sensing, and centralized control.
Since UAVs are pilot-less (no direct human operators on-board) and depend on the communication
and guidance of ground control stations or satellite station, it is necessary that communication networks
remain highly secure from potential network attack for resilient UAV operations. Communication
between UAVs and ground control stations are accomplished through a temporarily created UAV
gateway of the UAV network formed on the fly. However, the UAV network has several security
challenges given the frequently changing network topologies, network connectivity, and the high
mobility of UAVs.
UAV network security can be increasingly challenging as these devices operate in a dynamic
environment with significant resource constraints. Given this, security solutions for UAVs may
derive from resource issues such as limited communication bandwidth, computational capabilities,
and energy making wired networks such as Kerberos and transport layer security (TLS) impractical.
Mahmoud et al. [17], proposed a network architecture that can facilitate a secure communication
between UAVs and ground stations. The architecture is capable of supporting the specifications and
requirements of UAV networks where the architecture supports cryptographic primitives to secure
communication between airborne UAVs and ground stations.
configuration of the network’s behavior. In traditional networking systems, the network is responsible
for both the control and communication functions, which poses unique challenges as the infrastructure
and the packet control functions were interrelated.
The network infrastructure layer of the SDN model is similar to more traditional networking
systems as it includes networking devices that are directly responsible for handling packet data
as opposed to having to deal with networking traffic as well as complicated software-centered
decisions [25]. The control layer is the intermediate layer between the network infrastructure layer and
the application layer [26] which controls networking functions via programmable APIs. The emergence
of programmable control interface such as OpenFlow has offered a variety of ways to handle network
functions. For the most part, innovations in the control layer allow users to directly control network
functionality. One benefit of having a programmable networking interface is that network control
becomes centralized and is optimized by operators to meet the direct needs of the application [11].
The application layer houses the business logic that determines how resources are utilized [11].
Applications which run on the SDN network structure are responsible for communicating and
controlling behaviors for programmatically controlling the network behaviors of the control layer. SDN
has been used for different applications encompassing energy efficiency, security, network visibility
through its ability to define a protocol stack [11,27–29]. Recently, there have been research works for
incorporating SDN for UAV networks to make the UAV network more flexible and assist in effective
functionality. By implementing SDNs in UAV networks, it is easier to deploy the UAV network which
facilitates the control and management of network services and applications.
Electronics 2019, 8, 1468 7 of 25
an identified security risk or an attack. However, the programmability feature offered by SDN
eliminates such problems by allowing the programming of various security functions with ease.
For instance, it is possible to create an application for scanning and detecting security vulnerabilities
in a network or to implement intelligent security applications in the network for detecting specific
attacks such as DoS/DDoS attacks [29]. Network programmability not only leads to improved network
security, but it is also cost effective in that it does not require the acquisition and deployment of new
security products, which is a huge benefit compared to security in traditional network architectures.
Implementing SDN for UAVs is beneficial since SDN provides programmable and elastic
network infrastructure which facilitate effective management of dissimilar protocols and overall
network visibility [37]. SDN has features which makes it the best network to be used in unmanned
aerial vehicles.
Figure 4. Typical components of a Software Defined Networking (SDN) based UAV network.
Electronics 2019, 8, 1468 9 of 25
Several studies have highlighted the various ways that SDN can make UAV network more
secure. Packet delivery ratio by tuning network speeds in an SDN-based UAV network exceeds other
traditional ad hoc routing protocol [38]. Furthermore, SDN can adjust the UAV network topology in
prediction of future changes by using knowledge of physical relationships through SDN controller [38].
In the SDN based UAV network, UAVs implement SDN features and the ground station such as the
SDN controller as well as user equipment (UE) for control failures.
In the SDN-based UAV network, parameters of UAVs and network statistics are collected
by the SDN controller. After that, the final optimal decision is taken by utilizing the precise computed
results. The functional architecture of the UAV network is shown in Figure 5 with SDN controllers
for the UAV network. The UAV controller manages information such as physical location, battery
storage, and flight control and the SDN controller is to interact with the UAV controller and distribute
the information about UAVs network. When the SDN controller detects a poor wireless link state,
a message is sent to the UAV controller by the SDN controller. Then, the UAV adjusts the position with
the intention of having an improved and stable communication link according to the command of the
UAV controller. Significant strategies can be made based on the analysis and management of these
statistics, which are from the network and UAVs. As mentioned earlier, managing the vast bulk of
data is a problem.
Moreover, the limited energy resources put constraints on communication duration and
performance. Therefore, the full utilization of energy sources is required. To solve this problem,
Mozaffari et al. [38] implemented a monitoring platform, as shown in Figure 6. The platform consists of
four modules: monitoring display, flow management, strategies, and link management. The monitoring
display module acts as the GUI to the user and provides system status to the user. The flow management
module controls network flow by creating a set of configuration parameters to dictate how network
traffic flows.
Electronics 2019, 8, 1468 10 of 25
Within this SDN architecture, packets are transmitted from one network endpoint to another.
These endpoints may be a TCP/UDP port and IP address, etc. Dynamical management of the link
load is done by the link management module by receiving updates from the UAV and other modules
into considerations. The strategy module is responsible for developing algorithms and protocols.
This development depends on the demand of the application. There are some other modules in this
architecture and they are responsible for collecting information and performing calculations. The work
of Mozaffari [38] focuses on the degree that SDN can solve many of the issues that were discussed
above as it pertains to traditional networks.
SDN-Based Attack
Attack Type Pros and Cons
Mitigation
Pros:
+ Efficient Detection of denial of services attacks
+ Achieves Optimal Network effectiveness
Packet Flow
DDoS Cons:
Analysis [40]
- Imposes an overhead to network usage performance
- Also imposes overhead to network access
Pros:
+ Light weight detection protocol based on entropy variation analysis
+ Efficient detection rate over packet flow rate
Machine Learning
DDoS Cons:
algorithms [41]
- Can only detect single host target attacks
- Lacks support for multi host support mechanism
Pros:
Pros:
+ High number of control plane capacity
+ High data plane capacity to ensure maximum network utilization
Scotah: tool uses + Also supports third party integration
DDos overlay based on
Cons:
vSwitch [43]
- Algorithm learning rate is very low
- Perform real time efficiency glitches
Pros:
+ This model is efficient in learning abilities for small samples
+ It is capable of generalizing from noisy and redundant data
ANN based
DDos Cons:
algorithm [44]
- Algorithm learning rate is very low
- Perform real time efficiency glitches
Pros:
+ Reduces the amount of routing traffic
+ Can predict the network structure change
Packet Flow Analysis
DDos Cons:
and filtering [45]
- Makes network less flexible
- Requires a lot of additional resources adding more cost
Pros:
+ Imposes resiliency of network
Network + Reduces the outage rate of end-end communications
Jamming Management Cons:
Protocol [46]
- Imposes enhanced utilization of network energy sources
- Lacks mobility and other different traffic patterns
Pros:
+ Work well with attack detection and mitigation
+ Provide the fault free services
Network Parameter
Jamming Cons:
Analysis [47]
- Proposed models lacks protocol flexibility
- Only works well with the known type of attacks
Electronics 2019, 8, 1468 12 of 25
Table 1. Cont.
SDN-Based Attack
Attack Type Pros and Cons
Mitigation
Pros:
+ Efficient in communication and memory
SDN based + Improved support for attack detection probability in real time scenarios
Clone Attacks collaborative RED
Cons:
Protocol [48]
- Adds extra overhead to the network
Pros:
+ Support for threat detection mechanism
+ Performs better than other existing approaches for attack detection in
Energy
SDN based efficiency
Consumption + Robust against communication loss by using multi-path routing scheme
Collaborative Rule
and Clone
Enforcement [49] Cons:
Attacks
- Latency score for proposed model is low
- Adds extra overhead to the network
Pros:
+ Balances the load of nodes and reduces the network congestion
Spoofing GPS position finder + Supports the wireless network mesh & SDN protocols
Attack algorithm [50] Cons:
- No identification of optimal specifications
Pros:
+ This model also prevents the network controller from saturation and cache
misses attacks
Spoofing Node Configuration + Enables the system to handle the attack efficiently
+ Works well only with known definitions of attacks
Attack Restoration [51]
Cons:
- Does not work well with attack type detection and mitigation
However, apart from these attacks, DDoS attacks on UAV networks often lead to native device
disruptions. DDoS attacks enable adversaries to execute digital update rate attacks on the UAV
device [40]. UAV devices equipped with the autopilot options have digitized computers in a way
that allows all inputs sent through the UAV network to be discretized. DDoS attacks on UAV
networks can be mitigated by using SDN networks. Compared to traditional networks, SDN networks
provide network visibility which allows the SDN controller to monitor ongoing network activity
and identify instances of DDoS attacks [52]. The additional visibility allows the controllers and
switches of SDN to be able to recognize attributes of packet level data being transmitted through
the network. As a result, the ability to recognize and classify incoming data packet inputs enables
the SDN controller to determine data packet streams in the DDoS attack and can mitigate this attack via
traffic offloading or automated blocking of the instances of DDoS attacks [53]. Also, as DDoS attacks
usually target the protocol behaviors of UAV devices, the presence of SDN networks in a UAV network
identifies DDoS attacks aimed at disrupting protocol behavior and limits the connection aimed at UAV
device protocols.
As previously noted [40], due to the separation of the control plane and the data plane, most of
the SDN mitigation techniques for DDoS attacks have focused on analyzing network patterns.
The technique as advocated by [40] examines network flow patterns to detect abnormal network
patterns. To solve such problems associated with poor network performance and network degradation
during high network traffic periods, Wang [43] proposes a solution which enables the network to
scale up to better control high traffic loads. Scotch, is a tool which uses an overlay based on vSwitch,
to allow for elastically scaling up the capacity of SDN control plane. Scotch was designed to utilize
take advantage of the high capacity of the data plane. The scalability factor allows the SDN to scale
Electronics 2019, 8, 1468 13 of 25
to increase resilience under abnormal traffic surges such as DDoS attacks as well as under regular
traffic surges seen during flash crowds. Moreover, Scotch utilizes the high capacity of the data plane to
accommodate a large amount of VSwitches thus enabling it to scale the capacity of SDNs.
Another SDN network mitigation solution focuses on the implementation of machine learning
algorithms to provide automated protection against DDoS attacks. The work of [41] leverages
a machine learning algorithm to detect a DDoS attack by calculating the entropy of the destination
IP address via the SDN controller. A DDoS attack is determined when the entropy value rises above
the expected threshold.
The work of [42] also focuses on mitigating DDoS attacks in UAV devices has been proven
viable [42]. The authors propose the Resilient Control Network (ReCON) solution, which leverages
SDN resources to defend the network’s control plane from being affected by DDoS attacks.
ReCON seeks to minimize the critical resources shared to control traffic and data flows. Furthermore,
ReCON can further elastically increase the limited capacities of all the software control agents. ReCON
increases the abilities in real time by using the resources least utilized within the same SDN dynamically.
However, to implement and evaluate a practical solution, Gillani [42] designed ReCON as a solution
for problems associated with constraint satisfaction through the use of the Satisfiability Modulo Theory.
This theory guarantees control plane placement based on an accurate construction which handles any
dynamic network changes.
The work of [44] also seeks to leverage machine learning algorithms to better secure the SDN
network. The authors use artificial neural networks (ANN) to implement genetic algorithms to make
intelligent decisions regarding network traffic. By equipping SDN networks with support vector
machine algorithms to allow the network to classify networking traffic using machine learning directly.
Jamming attacks pose a significant threat. Jamming attacks target communication and surveillance
components of the UAV device which has implications for the relay of information [54]. For example,
jamming attacks are used to perpetrate Automatic Detection Surveillance-Broadcast (ADS-B).
An ADS-B attacks components implemented in a UAV is used for navigating UAV devices during
the course of a mission. Cyber adversaries use jamming attacks to block an airborne UAV device
from communicating with the legitimate control station. Jamming attacks on UAV networks are also
able to target the navigational systems and impede their ability to connect to the Global Positioning
Systems (GPS) therefore, disrupting critical navigation guidance [55]. This attack also has implications
for disrupting the UAV devices ability to operate on autopilot or deliver critical payload information.
If an adversary launches a jamming attack to block communication against UAV network, the SDN
controller can detect the cause of the disruptions [47]. Seciniti [46] proposed a network management
protocol that leverages a multi-layer graph model which can evaluate various communication
pathways as a means of enhancing resilience in connectivity. This proposed implementation ensures
that UAV devices seeks to increase UAV resilience to jamming attacks.
Another attack that can be perpetrated against UAV devices is cloning attacks. A cloning attack is
where an adversaries capture a UAV device operating within the network and reprogram the device.
This re-programmes the device and assists in perpetuating additional attacks against the network [48].
This attack can affect additional nodes as membership to the network can allow it access to legitimate
pieces of information, therefore aiding in the attack process. Clone attacks require early detection of
these affected nodes to secure the network from malicious activities [56]. However, these attacks are
crucial in their nature as their existing solutions for these attacks demands more energy resources [57].
Researchers have sought ways to provide early detection of clone devices to ensure secure network
reliability [48,56,57].
An early detection mechanism includes the witness-based detection system in which each device
is required to send proper identification concerning a set of coordinates, therefore acting as a witness
for the device. This solution is based upon the fact that each device should maintain the same
identification ID but different positions. When more than one node sends the same ID with different
Electronics 2019, 8, 1468 14 of 25
position information, the clone attack is detected [57–60]. However, these approaches are not as
efficient because these devices have limited storage, computational capacity and power resources [57].
Meanwhile, data transfer in more extensive networks requires data aggregation to reduce
communication overhead and energy consumption. Roy et al. [49], proposed a loss resilient model
named synopsis defusion. Synopsis defusion uses the duplicate insensitive algorithm to aggregate
on the top of routing schemes. However, this model lacks the better clone attack as these models
do not address the sub-aggregation of malicious nodes in the network under attack. Also, the work
of [61] proposes using the programmable open flow switches in the router to allow for more dedicated
and secure communication channels. This model enables the nodes to drop the malicious packets by
analyzing them to curb the smart adversaries [62].
Cloning attacks in distributed environment where the route for common node and witness node
is distributed, ensuring the credibility witness node can be problematic [48]. For distributed networks,
Conti et al. [48], proposed a randomized, efficient and distributed protocol for node replication
attacks. This protocol starts by identifying the nodes and monitoring its data flow. This protocol
randomly decides the witness based of network-wide seeds and the notion that if the adversary knows
the location of the witness nodes, then it can subvert security protocols making clone attack detection
more challenging [56].
Another proposed solution to mitigate vulnerabilities introduced via malfunctioning devices
in the network can be reverted by leveraging SDN. The SDN control plane can detect malfunctioning
nodes then transmit the information with respect to the ordinary device nodes over the network [63].
Concerning the solution proposed by [63], the controller detects the node as either disrupting or
untrusted and instructs other nodes to cut off communication with the identified device. Apart from
this, the SDN controller can also instruct the nodes to ignore the data being transmitted by these cloned
nodes in typical ad-hoc environment [63].
Spoofing is a also common attack perpetrated against UAV networks. Spoofing is where input
data is manipulated for malicious purposes. For example, spoofing attacks on UAV devices can lead
to improper execution of gain scheduling attacks. With this attack, Cyber adversaries can launch
scheduled attacks with the intent of gaining complete control of UAV systems. The authors of [64]
point out that UAVs require various sensors to perform properly, allowing for full usage of UAVs.
Spoofing attacks can also be executed against device functions needed for auto-piloting. These attacks
not only impact specific UAV sensor functions but could also impact the UAV as a whole.
SDN-based solutions for mitigation spoofing attacks are used to ensure that sensor activity can
continue despite being targeted. The SDN architecture facilitates implementation of storage solutions
that support network data to be backed up from the device. Once the UAV device has been targeted,
the SDN controller can be programmed to override all the compromised controls using the data from
the storage backup [51]. Moreover, the SDN controllers allow for continuous monitoring of UAV
networks for signs of spoofing intrusions to allow the deployment of preventive measures to preserve
the UAV network before being fully compromised.
In [50], notes that networks are equipped with a GPS position finder algorithms that assist
in recovering disabled or disconnected network devices using spatial clustering based on density.
The algorithm calculates the most appropriate position of one or more mobile devices are actively
deployed, then the affected network connection will be restored within the shortest period.
The proposed method also assists in improving communication performance.
solutions for UAV networks. To aid in the categorization of the solutions we present the solutions by the
following categories: Confidentiality, Integrity, and Availability in the following sections and Table 2.
Pros:
+ Efficient Detection of Denial of Services attacks
Proposed SDN/OODA + Achieves Optimal Network effectiveness
Availability Networking Cons:
Architecture [66]
- Imposes an overhead to network usage performance
- Also imposes overhead to network access
Pros:
+ Proactive routing allows for strengthened connections during rapid
movement
Temporospatial Software + Maintains topology knowledge of global network (both current and
Availability Defined Networking predictive) for increased reliability
(TS-SDN) [37] Cons:
- Routing is limited due to the lack of addressing hierarchy
- Inability to mitigate against Line-Of-Sight disruptions
Pros:
+ Modular mitigation approach allowing for rapid innovation and
deployment
SDN/NFV Integrated + Integrates network monitoring tools for real-time device
Availability Monitoring notifications
Architecture [67] Cons:
- Solution effectiveness informed by UAV device limitations
- Limited testing data/scenarios for implementation
Pros:
+ Efficient Detection of denial of services attacks
+ Achieves Optimal Network effectiveness
SDN/OODA Integrated
Availability Cons:
Platform [68]
- Imposes an overhead to network usage performance
- Also imposes overhead to network access
Pros:
+ Efficient Detection of denial of services attacks
Mobility Model for + Achieves Optimal Network effectiveness
Availability Multi-UAV WSN Cons:
networks [69]
- Imposes an overhead to network usage performance
- Also imposes overhead to network access
Pros:
+ Controller placement allows for a reduction in network overhead
Large scale UAV nodes in Cons:
Availability
network [70]
- Tradeoff exist between the end to end delay and control packet
communication overhead
Electronics 2019, 8, 1468 16 of 25
Table 2. Cont.
Pros:
+ Controller placement allows for a reduction in network overhead
Large scale UAV nodes in Cons:
Availability
network [71]
- Tradeoff exist between the end to end delay and control packet
communication overhead
Pros:
+ Provides the multipath TCP communication over the heterogeneous
networks
+ More reliable network in comparison to single path TCP networks
regarding the handling of the rapid handoffs in the network
+ SDN controller is enable to adjust the locations of UAV nodes
Multi-tier mesh UAV dynamically
Availability + Robust system to handle link congestions and more bandwidth
network [71]
utilization
Cons:
- The proposed solution adds additional overhead for the network to
process
- adds additional overhead on the network
Pros:
+ Provides the multipath TCP communication over the heterogeneous
networks
+ More reliable network in comparison to single path TCP networks
regarding the handling of the rapid handoffs in the network
+ SDN controller is enable to adjust the locations of UAV nodes
Multi-tier heterogeneous dynamically
Availability
UAV networks [72] + Robust system to handle link congestions and more bandwidth
utilization
Cons:
- Solution adds additional overhead for the network
- adds additional overhead on the network
Pros:
+ collaborative decision making by using SDN and UAV flight
controller
Dyna-Q-based + Higher learning rate for the attack detection
Availability reinforcement learning + collaborative tracking and optimization against jamming attacks
algorithm [73] Cons:
- Dyna-Q environment is difficult to build and implement
- Adds additional overhead to the network for communication
Electronics 2019, 8, 1468 17 of 25
Table 2. Cont.
Pros:
+ the models displays high detection rate for large scale UAV network
+ low number of false positive detections for network traffic
Hierarchical Detection and + resilient model against grey hole, spoofing and jamming attacks
Availability
Response Scheme [74] Cons:
- adds additional overhead and latency into the network
- tradeoff between efficiency in energy and security
Pros:
+ resilient model for false node injection and eavesdropping attacks
+ only authorized and authentic nodes can join the network
+ security solutions for major cyber-attacks by means of flexible and
SDN/OODA Integrated programmable central SDN controller in the UAV network
Availability
Platform [68]
Cons:
- adds additional overhead of node verification and authentication
- displays high latency for the UAV nodes’ communication
Pros:
+ adoption of Dijkstra algorithm to assist with calculating diverse
paths for optimal routing
+ efficient model for the reconfiguration of isolated nodes by the
SD-UAV Networking means of SDN controller
Architecture which + model treats every node as SDN switch for better reconfiguration
Availability and dynamic switching
leverages Various Wireless
Link Technologies [46] Cons:
- only consistent with the modern wireless communication standards
- adds additional overhead on the network for average end-to-end
link outages
Pros:
+ resilient model for the network jamming attacks
+ weighted routing metrics for data flow in the network
+ resiliency for end-to-end link outages
SDN Based Weighted Cons:
Availability
Routing Framework [75]
- adds additional overhead for network
- adds additional latency for the nodes in the network
- tradeoff between latency and efficiency over contemporary
competing approaches
Pros:
+ collaborative decision making by using SDN and UAV flight
controller
+ Higher learning rate for the attack detection
Aerial Network + collaborative tracking and optimization against jamming attacks
Availability
management protocol [46]
Cons:
- complexity in architecture implementation
- adds additional overhead on the network
Electronics 2019, 8, 1468 18 of 25
to enhance the real-time awareness of the platform. Notifications are sent to the pilot if the UAV
functionality moves outside of specific predictable ranges.
Mishra et al. [66], proposed integrating oriented Observe, Orient, Decide, and Act (OODA)
principals into the SDN controller to allow for improved situational awareness during coalition
operations. Coalition operations are operations which involve multiple coalition forces. The authors
implement the security situational awareness as a OODA loop in the SDN network. This architecture
allows for the integration of multiple military networks to increase collaboration between coalition
networks. Within this solution, the OODA loop is responsible for assessing the information and
coordinating that information regarding security threats via REST interface. The mitigation ability of
this solution is based on its ability to share information regarding UAV network attacks with coalition
members. This enhances the ability to mitigate network attacks based upon the sharing of information
to reduce vulnerabilities in real time. The proposed architecture allows for integrated insight into
attacks via mitigation and attack information shared across the coalition network.
Mishra et al. [68], proposed a model that incorporates the SDN controller as part of the support
infrastructure for the network. The nodes that wish to join the network share the credentials
for the authentication to keep the network intact from various malicious and false node dissemination
attacks. The controller SDN is leveraged in way that it responses quickly with the fed credentials
and also provides the security policies for the node and derivations of the operations of the node
in the network. The controller is also equipped for the traffic control and routing for the data flow
in the network [68].
On the contrary, the node must inform the controller how to gracefully exit the network, to ensure
the integrity of the network topology. Furthermore, the rapid change in network topology via the
multi-hop communication channels operates dynamically as communication follows between peers
and internal nodes. The resilience in these solutions minimizes the impact of complex outages.
Kumar et al. [69], proposed a model that evaluates the density of the network and authenticates
the data flow in the network. The proposed model maps the network into a matrix and divides
them into sectors. Nodes which fall into a particular section are considered as the default node.
A statistical model is then incorporated to determine the controller and the cluster head. The controller
is responsible for monitoring the flow of the data for the authentication and coordination of the nodes
residing in the network. This novel mobility model is helpful for the way-point secure transmission of
the data. Additionally, they were able to enhance the throughput and coverage of the network.
Rehman et al. [70] proposed a scheme aimed at reducing the overhead by control packets. The key
finding of this study is that, if the controller is placed in a way that number of hops remains low,
the overhead faced by control packets is reduced. However, the author has argued that there exists
a tradeoff between the control overhead and end-to-end delay of the packets.
Moradi et al. [71] proposed a framework in which he discussed the network of Evolved Packet
Core (EPC) and Radio Access Network (RAN) for UAV. The EPC module consist of the control plane
and data plane. The data plane in his proposed framework is responsible for imposing operator policies
on the data traffic flow. The direction of flow can be to/from user equipment. However, the control
plane is responsible for maintaining key roles such as access control, mobility reconfiguration and
security definitions enforcement to prevent the network from several wide spectrum attacks.
Zhao et al. [72] proposed a SDN based framework for special UAV networks such as ships and
shore nodes. The author argues that preexisting approach are heavily dependent on the satellite
communication which uses the single path TCP for reliable non-interactive data transmission.
However, the challenges faced by single path TCP can be resolved by using multipath TCP to improve
the overall throughput and reduce the handover delays for the networks. However, the proposed
solution uses the centralized SDN controller which uses the OpenFlow on top of it to make the proposed
model more robust in response to attacks and security management.
Pu et al. [54], present a multipath routing protocol to allow for more efficient data transmission
and increasingly reliable communication. During the occurrence of jamming attacks, in FANETs
Electronics 2019, 8, 1468 20 of 25
the network resiliency is also improved. To differentiate the link qualities between a node and
its neighbor nodes, the link quality scheme is proposed by using the statistical information of
received signal strength indication of received packets. The authors present an analytical model
and its numerical result in terms of RREP packet reception rate of source node. They modify three
representative routing protocols, which are dynamic source routing (DSR), optimized link state routing
(OLSR), and split multipath routing (SMR), to work in FANETs for performance comparison.
Sedjelmaci et al. [74] advocated for a novel intrusion detection and response system model which
detects the network intrusion aimed to undermine the efficiency of the network. The proposed model
classifies node behaviors normal, abnormal and malicious behavior. After the node’s behavior is
organized, the framework incorporates Support Vector Machine (SVM) enables the module to verify
the attack detection at the ground station. The author has conducted various experiments to emphasize
the simulation results which depict the model’s efficiency to detect the attacks on the large scale density
of the network [74].
Secinti et al. [46], proposed a hybrid model for the UAV network communication that establishes
the SDN framework on the top of the network architecture. Regarding communication, it is increasingly
challenging due to multiple interfaces at the current time. The overall directives for the nodes in the
network are set by the controller to ensure network integrity. The controller then derives the operations
for each node residing on the network while also serving as an SDN switch. To determine if the
network was affected, if a node gets isolated or collapses, the controller calculates the most dynamic
and flexible routing paths for the data flow. This proposed model also incorporates the OpenFlow 1.5
protocol on each UAV node for quick switching for the dynamic routing based on the flow pattern set
by the centralized controller [46].
In another study, Secinti et al. [75] proposed a framework that integrates the SDN controller to
ensure robust communication over the UAV network. In this proposed model, the controller develops
a connectivity graph of the UAV nodes on the network by leveraging the location coordinates to
determine the availability of the node. Once established, the controller calculates the shortest path for
the UAV nodes while making sure that every discovered route entails the UAV node had previously
connected to an already discovered routing path. This process of route finding is accomplished
by the reviewing node participation in relation to routes that operate in a wider networking range.
Zhiwei Li et al. [73] propose a dual framework for solving these smart jamming attacks by using
the SDN and UAV. The proposed model works on the collaborative decision making function by using
the means of SDN controller and UAV flight controller. These hybrid controller are responsible for
collecting the state information about the network which is further used by Dyna Q based reinforcement
learning model. This learning model learns about the network state and take decision about the power
allocation and derive the defense strategies to mitigate the smart jamming attacks.
Pedro Cumino et al. [21] proposed a hybrid framework using cooperative UAV approach and
SDN named as VOEI. VOEI is equipped with decision making by considering the energy limitations of
the UAV nodes to prevent the energy related issues of the nodes, network access issues, route failures,
and enhances the quality of video transmissions. These operations are done by using the flexibility of
the SDN on the top of the nodes architecture to separate the data and control plane thus giving more
flexibility and programmability to the network on the fly. VOEI can be very helpful due to the fact
that SDN controller takes into account the information of the network to develop more reliable energy
routes for better data transmission which is loss pruned in real time. In this framework, the controller
is responsible for reliable calculation along with the UAV nodes’ backup to keep the network execution
smooth even some damage occurs to the network. However, to share the information of the network
with the controller, the nodes exchange the control packets with the controller. This exchange of
packets can impose additional overhead on the network.
The above solutions seek to highlight the SDN enabled UAV network security solutions which
have been used to mitigate network vulnerabilities within the UAV networks. One notable point from
our study is that most of the solutions mentioned in our study focused on making this network more
Electronics 2019, 8, 1468 21 of 25
resilient to disruptions. What is clear based upon our study results, is that additional work needs to
be done to further explore the SDN architecture and its ability to secure UAV networks outside of its
availability. In the next section, we will discuss open issues related to the field of UAV network security.
9. Conclusions
In UAV networks, communication in UAVs is perhaps the most fundamental property of their
diverse use, including civilian and military applications. Ensuring that these UAV devices are capable
of securely transmitting data to both UAVs and ground infrastructures, is one of the critical issues.
For our study, we have reviewed common cyber-attacks such as DDoS, jamming, device cloning and
spoofing and their respective solutions. We have presented different approaches that are available
in the state of the art literature and have compared them side-by-side based on their pros and cons
in a tabular form. Because of the highly dynamic nature of UAVs and UAV network topology,
traditional cyber-defense solutions are not applicable in a straightforward manner. Overall, additional
research and development should focus on leveraging the flexibility of the SDN architecture to
automate the detection of networking attacks. Of all of the cyber attacks discussed, most of the research
has focused on mitigating DDoS attacks. The intersection of machine learning algorithms to mitigate
networking attacks has seemed to provide the most promise.
Author Contributions: This survey articles was the result of contributions from all authors more or less equally.
Funding: This work is partly supported by the U.S. National Science Foundation (NSF) under grants CNS
1650831 and HRD 1828811, and by the U.S. Department of Homeland Security (DHS) under grant award number,
Electronics 2019, 8, 1468 22 of 25
2017-ST-062-000003. However, any opinion, finding, and conclusions or recommendations expressed in this
document are those of the authors and should not be interpreted as necessarily representing the official policies,
either expressed or implied, of the funding agencies (NSF and DHS).
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Rango, A.; Laliberte, A.; Steele, C.; Herrick, J.E.; Bestelmeyer, B.; Schmugge, T.; Roanhorse, A.; Jenkins, V.
Using unmanned aerial vehicles for rangelands: current applications and future potentials. Environ. Pract.
2006, 8, 159–168. [CrossRef]
2. Grodi, R.; Rawat, D.B. UAV-assisted broadband network for emergency and public safety communications.
In Proceedings of the 2015 IEEE Global Conference on Signal and Information Processing (GlobalSIP),
Orlando, FL, USA, 14–16 December 2015; pp. 10–14.
3. Rawat, D.B.; Grodi, R.; Bajracharya, C. Enhancing connectivity for communication and control in unmanned
aerial vehicle networks. In Proceedings of the 2015 IEEE Radio and Wireless Symposium (RWS), San Diego,
CA, USA, 25–28 January 2015; pp. 200–202.
4. Rawat, D.B.; Ghafoor, K.Z. Smart Cities Cybersecurity and Privacy; Elsevier: Amsterdam, The Netherlands, 2018.
5. Unmanned Aircraft System (UAS) Service Demand 2015–2035; U.S. Air Force: Bedford, MA, USA, 2013.
6. Hartmann, K.; Steup, C. The vulnerability of UAVs to cyber attacks-An approach to the risk assessment.
In Proceedings of the 2013 5th International Conference on Cyber Conflict (CyCon), Tallinn, Estonia,
4–7 June 2013; pp. 1–23.
7. Rani, C.; Modares, H.; Sriram, R.; Mikulski, D.; Lewis, F.L. Security of unmanned aerial vehicle systems
against cyber-physical attacks. J. Def. Model. Simul. 2016, 13, 331–342. [CrossRef]
8. Kim, A.; Wampler, B.; Goppert, J.; Hwang, I.; Aldridge, H. Cyber attack vulnerabilities analysis for unmanned
aerial vehicles. In Proceedings of the Infotech@Aerospace 2012, Garden Grove, CA, USA, 19–21 June 2012;
p. 2438.
9. Mount, M.; Quijano, E. Iraqi Insurgents Hacked Predator Drone Feeds, U.S. Official Indicates.
Avaliable online: http://edition.cnn.com/2009/US/12/17/drone.video.hacked/index.html (accessed on 18
December 2009).
10. Arthur, C. SkyGrabber: The $26 Software Used by Insurgents to Hack into US Drones. Guardian 2009, 17.
Avaliable online: https://www.theguardian.com/technology/2009/dec/17/skygrabber-software-drones-
hacked (accessed on 17 December 2019).
11. Rawat, D.B.; Reddy, S.R. Software defined networking architecture, security and energy efficiency: A survey.
IEEE Commun. Surv. Tutor. 2017, 19, 1. [CrossRef]
12. Haleplidis, E.; Pentikousis, K.; Denazis, S.; Salim, J.H.; Meyer, D.; Koufopavlou, O. Software-Defined
Networking (SDN): Layers and Architecture Terminology; Technical Report; Internet Research Task Force. 2015.
Available online: https://www.rfc-editor.org/info/rfc7426 (accessed on 31 January 2015).
13. Wagner, W. Lightning Bugs and Other Reconnaissance Drones; Armed Forces Journal International: Springfield,
VA, USA, 1982.
14. Sanders, R. An Israeli Military Innovation: Uavs; Technical Report; Industrial College of the Armed Forces:
Washington, DC, USA, 2003.
15. Carr, E.B. Unmanned Aerial Vehicles: Examining the Safety, Security, Privacy and Regulatory Issues of Integration
into U.S. Airspace; National Centre for Policy Analysis (NCPA): Dallas, TX, USA, 2013.
16. Newcome, L.R. Unmanned Aviation: A Brief History of Unmanned Aerial Vehicles; American Institute of
Aeronautics and Astronautics: Reston, VA, USA, 2004.
17. Mahmoud, S.; Mohamed, N. Collaborative UAVs cloud. In Proceedings of the 2014 International Conference
on Unmanned Aircraft Systems (ICUAS), Orlando, FL, USA, 27–30 May 2014; pp. 365–373.
18. Jawhar, I.; Mohamed, N.; Al-Jaroodi, J.; Agrawal, D.P.; Zhang, S. Communication and networking of
UAV-based systems: Classification and associated architectures. J. Netw. Comput. Appl. 2017, 84, 93–108.
[CrossRef]
19. Oubbati, O.S.; Lakas, A.; Lagraa, N.; Yagoubi, M.B. UVAR: An intersection UAV-assisted VANET routing
protocol. In Proceedings of the 2016 IEEE Wireless Communications and Networking Conference (WCNC),
Doha, Qatar, 3–6 April 2016; pp. 1–6.
Electronics 2019, 8, 1468 23 of 25
20. Scherer, J.; Yahyanejad, S.; Hayat, S.; Yanmaz, E.; Andre, T.; Khan, A.; Vukadinovic, V.; Bettstetter, C.;
Hellwagner, H.; Rinner, B. An autonomous multi-UAV system for search and rescue. In Proceedings of the
First Workshop on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use, Florence,
Italy, 18 May 2015; ACM: New York, NY, USA, 2015; pp. 33–38.
21. Cumino, P.; Lobato Junior, W.; Tavares, T.; Santos, H.; Rosário, D.; Cerqueira, E.; Villas, L.; Gerla, M.
Cooperative UAV Scheme for Enhancing Video Transmission and Global Network Energy Efficiency. Sensors
2018, 18, 4155. [CrossRef]
22. Wei, S.; Ge, L.; Yu, W.; Chen, G.; Pham, K.; Blasch, E.; Shen, D.; Lu, C. Simulation study of unmanned
aerial vehicle communication networks addressing bandwidth disruptions. In Sensors and Systems for Space
Applications VII: International Society for Optics and Photonics; SPIE: Bellingham, WA, USA, 2014; Volume 9085.
23. Scott-Hayward, S.; O’Callaghan, G.; Sezer, S. SDN security: A survey. In Proceedings of the 2013 IEEE SDN
For Future Networks and Services (SDN4FNS), Trento, Italy, 11–13 November 2013; pp. 1–7.
24. Kreutz, D.; Ramos, F.M.; Verissimo, P.E.; Rothenberg, C.E.; Azodolmolky, S.; Uhlig, S. Software-defined
networking: A comprehensive survey. Proc. IEEE 2015, 103, 14–76. [CrossRef]
25. MacFarland, D.C.; Shue, C.A. The SDN shuffle: creating a moving-target defense using host-based
software-defined networking. In Proceedings of the Second ACM Workshop on Moving Target Defense,
Denver, CO, USA, 12 October 2015; ACM: New York, NY, USA, 2015; pp. 37–41.
26. Nunes, B.A.A.; Mendonca, M.; Nguyen, X.N.; Obraczka, K.; Turletti, T. A survey of software-defined
networking: Past, present, and future of programmable networks. IEEE Commun. Surv. Tutor. 2014,
16, 1617–1634. [CrossRef]
27. Jagadeesan, N.A.; Krishnamachari, B. Software-defined networking paradigms in wireless networks:
A survey. ACM Comput. Surv. 2015, 47, 27. [CrossRef]
28. Hadj, S.B.; Rekhis, S.; Boudriga, N.; Bagula, A. A cloud of UAVs for the Delivery of a Sink As A Service to
Terrestrial WSNs. In Proceedings of the 14th International Conference on Advances in Mobile Computing
and Multi Media, Singapore, 28–30 November 2016; ACM: New York, NY, USA, 2016; pp. 317–326.
29. Shin, S.; Xu, L.; Hong, S.; Gu, G. Enhancing network security through software defined networking (SDN).
In Proceedings of the 2016 IEEE 25th International Conference on Computer Communication and Networks
(ICCCN), Waikoloa, HI, USA, 1–4 August 2016; pp. 1–9.
30. Shu, Z.; Wan, J.; Li, D.; Lin, J.; Vasilakos, A.V.; Imran, M. Security in software-defined networking: Threats
and countermeasures. Mob. Netw. Appl. 2016, 21, 764–776. [CrossRef]
31. Weinstein, S.B. SDN control in a combined sensor, information retrieval, and communications network
for dangerous environments. In Proceedings of the 2017 IEEE International Conference on Microwaves,
Antennas, Communications and Electronic Systems (COMCAS), Tel-Aviv, Israel, 13–15 November 2017;
pp. 1–5.
32. Caria, M.; Jukan, A.; Hoffmann, M. SDN partitioning: A centralized control plane for distributed routing
protocols. IEEE Trans. Netw. Serv. Manag. 2016, 13, 381–393. [CrossRef]
33. Liyanage, M.; Abro, A.B.; Ylianttila, M.; Gurtov, A. Opportunities and challenges of software-defined mobile
networks in network security. IEEE Secur. Priv. 2016, 14, 34–44. [CrossRef]
34. Shaghaghi, A.; Kaafar, M.A.; Buyya, R.; Jha, S. Software-Defined Network (SDN) Data Plane Security: Issues,
Solutions and Future Directions. arXiv 2018, arXiv:1804.00262.
35. Sasaki, T.; Pappas, C.; Lee, T.; Hoefler, T.; Perrig, A. SDNsec: Forwarding accountability for the SDN data
plane. In Proceedings of the 2016 25th International Conference on Computer Communication and Networks
(ICCCN), Waikoloa, HI, USA, 1–4 August 2016; pp. 1–10.
36. Gupta, L.; Jain, R.; Vaszkun, G. Survey of important issues in UAV communication networks. IEEE Commun.
Surv. Tutor. 2016, 18, 1123–1152. [CrossRef]
37. Barritt, B.; Kichkaylo, T.; Mandke, K.; Zalcman, A.; Lin, V. Operating a UAV mesh & internet backhaul
network using temporospatial SDN. In Proceedings of the 2017 IEEE Aerospace Conference, Big Sky, MT,
USA, 4–11 March 2017; pp. 1–7.
38. Mozaffari, M.; Saad, W.; Bennis, M.; Nam, Y.H.; Debbah, M. A tutorial on UAVs for wireless networks:
Applications, challenges, and open problems. arXiv 2018, arXiv:1803.00680.
39. Lee, S.; Yoon, C.; Lee, C.; Shin, S.; Yegneswaran, V.; Porras, P.A. DELTA: A Security Assessment Framework for
Software-Defined Networks; NDSS: New York, NY, USA, 2017.
Electronics 2019, 8, 1468 24 of 25
40. Giotis, K.; Argyropoulos, C.; Androulidakis, G.; Kalogeras, D.; Maglaris, V. Combining OpenFlow and
sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments.
Comput. Netw. 2014, 62, 122–136. [CrossRef]
41. Mousavi, S.M.; St-Hilaire, M. Early detection of DDoS attacks against SDN controllers. In Proceedings of the
2015 International Conference on Computing, Networking and Communications (ICNC), Garden Grove,
CA, USA, 16–19 February 2015; pp. 77–81.
42. Gillani, F.; Al-Shaer, E.; Duan, Q. In-design Resilient SDN Control Plane and Elastic Forwarding Against
Aggressive DDoS Attacks. In Proceedings of the 5th ACM Workshop on Moving Target Defense, Toronto,
ON, Canada, 15 October 2018; ACM: New York, NY, USA, 2018; pp. 80–89.
43. Wang, A.; Guo, Y.; Hao, F.; Lakshman, T.; Chen, S. Scotch: Elastically scaling up sdn control-plane
using vswitch based overlay. In Proceedings of the 10th ACM International on Conference on Emerging
Networking Experiments and Technologies, Sydney, Australia, 2–5 December 2014; ACM: New York, NY,
USA, 2014; pp. 403–414.
44. Ashraf, J.; Latif, S. Handling intrusion and DDoS attacks in Software Defined Networks using machine
learning techniques. In Proceedings of the 2014 National Software Engineering Conference, Rawalpindi,
Pakistan, 11–12 November 2014; pp. 55–60.
45. Kirichek, R.; Vladyko, A.; Paramonov, A.; Koucheryavy, A. Software-defined architecture for flying
ubiquitous sensor networking. In Proceedings of the 2017 19th International Conference on Advanced
Communication Technology (ICACT), Bongpyeong, Korea, 19–22 February 2017; pp. 158–162.
46. Secinti, G.; Darian, P.B.; Canberk, B.; Chowdhury, K.R. SDNs in the Sky: Robust End-to-End Connectivity
for Aerial Vehicular Networks. IEEE Commun. Mag. 2018, 56, 16–21. [CrossRef]
47. Bindra, N.; Sood, M. Is SDN the Real Solution to Security Threats in Networks? A Security Update on
Various SDN Models. Indian J. Sci. Technol. 2016, 9. [CrossRef]
48. Conti, M.; Di Pietro, R.; Mancini, L.; Mei, A. Distributed detection of clone attacks in wireless sensor
networks. IEEE Trans. Dependable Secur. Comput. 2011, 8, 685–698. [CrossRef]
49. Roy, S.; Conti, M.; Setia, S.; Jajodia, S. Secure data aggregation in wireless sensor networks: Filtering out the
attacker’s impact. IEEE Trans. Inf. Forensics Secur. 2014, 9, 681–694. [CrossRef]
50. Sriramulu, R.K. Constructing Dynamic Ad-hoc Emergency Networks using Software-Defined Wireless Mesh
Networks. Master’s Thesis, San Jose State University, San Jose, CA, USA, 2018.
51. Afek, Y.; Bremler-Barr, A.; Shafir, L. Network anti-spoofing with SDN data plane. In Proceedings of the IEEE
Conference on Computer Communications (INFOCOM 2017), Atlanta, GA, USA, 1–4 May 2017; pp. 1–9.
52. Dharma, N.G.; Muthohar, M.F.; Prayuda, J.A.; Priagung, K.; Choi, D. Time-based DDoS detection and
mitigation for SDN controller. In Proceedings of the 2015 17th Asia-Pacific Network Operations and
Management Symposium (APNOMS), Busan, Korea, 19–21 August 2015; pp. 550–553.
53. Ali, A.; Cziva, R.; Jouët, S.; Pezaros, D.P. SDNFV-Based DDoS Detection and Remediation in Multi-tenant,
Virtualised Infrastructures. In Guide to Security in SDN and NFV; Springer: Berlin, Germany, 2017; pp. 171–196.
54. Pu, C. Jamming-Resilient Multipath Routing Protocol for Flying Ad Hoc Networks. IEEE Access 2018,
6, 68472–68486. [CrossRef]
55. Sliti, M.; Abdallah, W.; Boudriga, N. Jamming Attack Detection in Optical UAV Networks. In Proceedings
of the 2018 20th International Conference on Transparent Optical Networks (ICTON), Bucharest, Romania,
1–5 July 2018; pp. 1–5.
56. Conti, M.; Di Pietro, R.; Spognardi, A. Clone wars: Distributed detection of clone attacks in mobile WSNs.
J. Comput. Syst. Sci. 2014, 80, 654–669. [CrossRef]
57. Dong, M.; Ota, K.; Yang, L.T.; Liu, A.; Guo, M. LSCD: A low-storage clone detection protocol for
cyber-physical systems. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 2016, 35, 712–723. [CrossRef]
58. Zheng, Z.; Liu, A.; Cai, L.X.; Chen, Z.; Shen, X.S. Energy and memory efficient clone detection in wireless
sensor networks. IEEE Trans. Mob. Comput. 2016, 15, 1130–1143. [CrossRef]
59. Lal, A.; Selvakumar, J. Secure low-storage clone detection technique for wireless sensor networks.
In Proceedings of the 2017 International Conference of Electronics, Communication and Aerospace
Technology (ICECA), Coimbatore, India, 20–22 April 2017; Volume 1, pp. 669–672.
60. Aalsalem, M.Y.; Khan, W.Z.; Saad, N.; Hossain, M.S.; Atiquzzaman, M.; Khan, M.K. A new random walk for
replica detection in WSNs. PLoS ONE 2016, 11, e0158072. [CrossRef]
Electronics 2019, 8, 1468 25 of 25
61. McKeown, N.; Anderson, T.; Balakrishnan, H.; Parulkar, G.; Peterson, L.; Rexford, J.; Shenker, S.; Turner, J.
OpenFlow: Enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 2008,
38, 69–74. [CrossRef]
62. Sayeed, M.A.; Sayeed, M.A.; Saxena, S. Intrusion detection system based on Software Defined Network
firewall. In Proceedings of the 2015 1st International Conference on Next Generation Computing
Technologies (NGCT), Dehradun, India, 4–5 September 2015; pp. 379–382.
63. Toso, G.; Munaretto, D.; Conti, M.; Zorzi, M. Attack resilient underwater networks through software defined
networking. In Proceedings of the International Conference on Underwater Networks & Systems, Rome,
Italy, 12–14 November 2014; ACM: New York, NY, USA, 2014; p. 44.
64. Noble, D.; Bhandari, S. Neural network based nonlinear model reference adaptive controller for an
unmanned aerial vehicle. In Proceedings of the 2017 International Conference on Unmanned Aircraft
Systems (ICUAS), Miami, FL, USA, 13–16 June 2017; pp. 94–103.
65. Yapp, J.; Seker, R.; Babiceanu, R. UAV as a Service: A Network Simulation Environment to Identify
Performance and Security Issues for Commercial UAVs in a Coordinated, Cooperative Environment.
In Proceedings of the International Workshop on Modelling and Simulation for Autonomous Systems, Rome, Italy,
15–16 June 2016; Springer: Cham, Switzerland, 2016; pp. 347–355.
66. Mishra, V.; Verma, D.; Williams, C. Leveraging sdn for cyber situational awareness in coalition tactical
networks. In Proceedings of the IST-148 Meeting, Sofia, Bulgaria, 3–4 October 2016; pp. 3–4.
67. White, K.J.; Denney, E.; Knudson, M.D.; Mamerides, A.K.; Pezaros, D.P. A programmable SDN+ NFV-based
architecture for uav telemetry monitoring. In Proceedings of the 2017 14th IEEE Annual Consumer
Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 8–11 January 2017; pp. 522–527.
68. Mishra, V.K.; Verma, D.C.; Williams, C. Improving Security in Coalition Tactical Environments Using an
SDN Approach. In Guide to Security in SDN and NFV; Springer: Cham, Switzerland, 2017; pp. 273–298.
69. Kumar, R.; Sayeed, M.A.; Sharma, V.; You, I. An SDN-Based Secure Mobility Model for UAV-Ground
Communications. In Proceedings of the International Symposium on Mobile Internet Security, Jeju Island, Korea,
19–22 October 2017; Springer: Singapore, 2017; pp. 169–179.
70. Ur Rahman, S.; Kim, G.H.; Cho, Y.Z.; Khan, A. Deployment of an SDN-based UAV network: Controller
placement and tradeoff between control overhead and delay. In Proceedings of the 2017 International
Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea, 18–20 October
2017; pp. 1290–1292.
71. Moradi, M. Software-Driven and Virtualized Architectures for Scalable 5G Networks. Ph.D. Thesis,
The University of Michigan, Ann Arbor, MI, USA, 2018.
72. Zhao, Q.; Du, P.; Gerla, M.; Brown, A.J.; Kim, J.H. Software Defined Multi-Path TCP Solution for Mobile
Wireless Tactical Networks. In Proceedings of the 2018 IEEE Military Communications Conference (MILCOM
2018), Los Angeles, CA, USA, 29–31 October 2018; pp. 1–9.
73. Li, Z.; Lu, Y.; Shi, Y.; Wang, Z.; Qiao, W.; Liu, Y. A Dyna-Q-Based Solution for UAV Networks Against Smart
Jamming Attacks. Symmetry 2019, 11, 617. [CrossRef]
74. Sedjelmaci, H.; Senouci, S.M.; Ansari, N. A hierarchical detection and response system to enhance security
against lethal cyber-attacks in UAV networks. IEEE Trans. Syst. Man. Cybern. Syst. 2018, 48, 1594–1606.
[CrossRef]
75. Secinti, G.; Darian, P.B.; Canberk, B.; Chowdhury, K.R. Resilient end-to-end connectivity for software defined
unmanned aerial vehicular networks. In Proceedings of the 2017 IEEE 28th Annual International Symposium
on Personal, Indoor, and Mobile Radio Communications (PIMRC), Montreal, QC, Canada, 8–13 October
2017; pp. 1–5.
c 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access
article distributed under the terms and conditions of the Creative Commons Attribution
(CC BY) license (http://creativecommons.org/licenses/by/4.0/).